Tag: Encryption

Oxynger KeyShield

Ordinary anti-keyloggers only protect from software keyloggers. But Oxynger KeyShield protect its keystrokes from software and hardware keyloggers. Also most anti-keyloggers won’t protect from kernel based keyloggers. Oxynger KeyShield is 100% protected against hook based, API based and kernel/driver based keyloggers. Portable version of Oxynger KeyShield is the world’s most secure method to enter passwords, …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/03/20/oxynger-keyshield/

sslstrip

This tool provides a demonstration of the HTTPS stripping attacks that I presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/03/15/sslstrip/

RainbowCrack

RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers. A brute force hash cracker generate all possible plaintexts and compute the corresponding hashes on the fly, then compare the hashes …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/03/02/rainbowcrack-2/

Medusa Parallel Network Login Auditor

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/02/24/medusa-parallel-network-login-auditor/

Crowbar

Crowbar (crowbar) is brute forcing tool that can be used during penetration tests. It is developed to brute force some protocols in a different manner according to other popular brute forcing tools. As an example, while most brute forcing tools use username and password for SSH brute force, Crowbar uses SSH key. So SSH keys, …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/02/23/crowbar/

COMODO Backup

COMODO Backup has tons of great features for a free backup program. It can backup registry files, files and folders, email accounts, particular registry entries, IM conversations, browser data, partitions, or entire disks like the system drive. Data can be backed up to a local or external drive, CD/DVD, network folder, FTP server, or sent …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/02/09/comodo-backup/

CAINE (Computer Aided INvestigative Environment)

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/01/24/caine-computer-aided-investigative-environment/

OpenStego

OpenStego is an open-source software distributed under the terms of the GNU General Public License v2.0. OpenStego provides two main functionalities: Data Hiding: It can hide any data within a cover file (e.g. images). Watermarking (beta): Watermarking files (e.g. images) with an invisible signature. It can be used to detect unauthorized file copying. Features: OpenStego …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2015/01/23/openstego/

Cipher Image Free

Use this easy free software for encoding images and hiding valuable textual info into the image (steganographie). Several encrypted images together with hidden text could be saved into one file. Features: Easy to use interface. Support of more than 21 image formats for loading and 7 formats for saving files. Save multiple images into one …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/25/cipher-image-free/

MP3stego

MP3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/25/mp3stego-2/

DeepSound

DeepSound is a steganography tool that hides secret data into audio files – wave and flac. The application also enables you to extract secret files directly from wav, flac, wma lossless or audio CD tracks. DeepSound might be used as copyright marking software for wave, flac, wma and audio CD. DeepSound also support encrypting secret …

Continue reading »

Permanent link to this article: https://www.darknessgate.com/2014/12/25/deepsound/